[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Phrack World News XXVII Part 2 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #27 | Release date : 1989-05-20 | Editor : Taran King
Phrack Inc. XXVII IndexKnight Lightning & Taran King
Operating The IBM VM/SP CPTaran King
Introduction To MIDNET: Chapter Seven Of The FTSKnight Lightning
NUA List For Datex-P And X.25 NetworksOberdaemon
COSMOS: COmputer System for Mainframe OperationS (Part Two)King Arthur
Looking Around In DECnetDeep Thought
The Making Of A HackerFramstag
Sending Fakemail In UnixDark OverLord
The Postal Inspection ServiceVendetta
Phrack World News XXVII Part 1Knight Lightning
Phrack World News XXVII Part 2Knight Lightning
Phrack World News XXVII Part 3Knight Lightning
Title : Phrack World News XXVII Part 2
Author : Knight Lightning
                                ==Phrack Inc.==

                     Volume Three, Issue 27, File 11 of 12

            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN               Issue XXVII/Part 2                PWN
            PWN                                                 PWN
            PWN                  June 20, 1989                  PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN

Robert T. Morris Suspended From Cornell                            May 25, 1989
Taken from the New York Times

Cornell University has suspended the graduate student identified by school
officials as the author of "the Internet worm."

In a May 16th letter to Robert Tappan Moris, age 23, the dean of the Cornell
University Graduate School said a university panel had found him guilty of
violating the school's Code of Academic Integrity.

He will be suspended until the beginning of the fall semester of 1990, and then
could reapply.

No criminal charges have been filed against Morris.  A federal grand jury this
year forwarded its recommendations to the Justice Department, which has not
taken any action.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Justice Department Wary in Computer Case                           May 28, 1989
by Matthew Spina (Syracuse Herald-American)

              "Is Washington Fearful Of Losing A Landmark Trial?"

Some computer experts theorize that the Justice Department, afraid of bungling
what could become a landmark computer case, still doesn't know how to treat the
Cornell student whose computer worm slithered nationwide in November, 1988.

A further concern in Washington:  A trial in the case might embarrass the
Department of Defense if its scientists are asked to detail how their computers
were among the thousands crippled by the worm.

For several months, the decision on how to charge 23-year-old Robert T. Morris,
Jr. had been before Mark Richard, a deputy assistant attorney general.  Within
the last few weeks, Richard made a decision that now is being reviewed by an
assistant attorney general, according to a computer professional who has been
talking with the Justice Department.

"I thought we would have heard something from Washington by now," said Andrew
Baxtoer, the assistant U.S. attorney who in November and December presented the
case to a grand jury in Syracuse.

The grand jury's report was sent on the the Justice Department, which refuses
to comment publicly on the matter because Morris has not been indicted.

"Within the next two weeks I assume that a decision will be made," said one

"If they decide to begin an expensive trial, they have to make sure they win so
as not to damage future attempts to prosecute under that law," said Eugene H.
Spafford, an assistant professor at Purdue University whose analysis of the
worm has helped federal investigators.  "If they decide not to prosecute, and
the total thing that happens is he gets suspended (from Cornell), I will be

So far, Cornell has taken the only disciplinary measure against Morris,
suspending him for the 1989-90 academic year.  But the graduate student left
the computer science department early in November, the day after the worm
spread out of a computer in Upson Hall.

Morris, a computer science graduate student, has been called the author of a
rogue computer program, called a worm, that was spread from a Cornell
University computer.  The program was designed to reproduce and infect any
computer linked to the Internet, a network shared by colleges, research centers
and military institutions.

However, experts say an error caused the program to replicate out of control,
sending thousands of copies into thousands of computers.

If Morris is to be charged with a felony, prosecutors would then have to show
he intended to destroy or extract information.

Proving that would be difficult since the program neither destroyed nor removed
information from any computer.

To convict Morris on most lesser charges, prosecutors would have to show he
intended to harm computers.

Prosecutors also could use a misdemeanor charge requiring them to prove only
that Morris gained access to a federal government computer. The worm did reach
computers at the Army Ballistics Research Laboratory and NASA's Langley
Research Center, among others.

Some computer experts wonder, though, if Defense Department officials will be
reluctant to testify publicly about how their computers were penetrated -- even
those computers holding non-classified information. In February, at a computer
convention in San Diego, Defense Department computer experts detailed some
security improvements made to the network since November, but then refused to
release copies of their presentation to people at the seminar.

The FBI -- which enforces the Computer Fraud and Abuse Act of 1986 -- and some
people in the computer industry are pushing for a vigorous prosecution to
display a strong case against computer hacking.  Others in the industry,
including some of Morris' friends from Harvard University and Cornell, urge
leniency because he was trying to demonstrate security flaws with computers.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Other articles about Robert Tappan Morris, Jr. and the Internet Worm are;

"Computer Network Disrupted By 'Virus'"            (11/03/88) PWN XXII/Part 2
"Virus Attack"                                     (11/06/88) PWN XXII/Part 2
"The Computer Jam:  How It Came About"             (11/08/88) PWN XXII/Part 2
"US Is Moving To Restrict {...} Virus"             (11/11/88) PWN XXII/Part 2 *
"FBI Studies Possible Charges In Virus"            (11/12/88) PWN XXII/Part 2
"Big Guns Take Aim At Virus"                       (11/21/88) PWN XXII/Part 3
"Congressman Plan Hearings On Virus"               (11/27/88) PWN XXII/Part 3
"Pentagon Severs Military {...} Virus"             (11/30/88) PWN XXII/Part 3 *
"Networks Of Computers At Risk From Invaders"      (12/03/88) PWN XXII/Part 4 *
"Computer Virus Eradication Act of 1988"           (12/05/88) PWN XXII/Part 4 *
"Breaking Into Computers {...}, Pure and Simple"   (12/04/88) PWN XXIV/Part 1 *
"Cornell Panel Concludes Morris {...} Virus"       (04/06/89) PWN XXVI/Part 1

* - Indicates that the article was not directly related to Robert Morris, but
    did discuss him as well as the Internet Worm incident.

SouthernNet's Anti-Hacker Psychological Con Game                     April 1989
WARNING!  Your call is being intercepted!

Error:  Setting may not be changed by callers.

                  Welcome to:  S o u t h e r n N e t   I n c.

You have reached the SouthernNet Fraud Department, the authorization code you
are attempting to use is not valid.  Hacking and illegal use of codes are
violations of state and federal laws.

We are currently conducting an investigaion for code abuse in your area and we
are coordinating the investigation with law enforcement authorities. Persons
identified hacking or abusing codes will be prosecuted to the full extent of
the law.

I'll see you soon,

Hacker Tracker
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Hold for additional information:

Hacker Tracker is unavailable right now; however, you may avoid possible arrest
and/or prosecution by calling Hacker Tracker in person.

You may contact Mr. Tracker between the hours of 9:00 AM and 5:00 PM Eastern
Standard Time, Monday - Friday, simply by dialing the access number you have
just used and code number 101010 or 011010 if the access  you have used
requires a seven digit code.  Just hold the line for 10 seconds and your call
will automatically be routed to Mr. Tracker at no charge to you.

This is *NOT* a trick and it will be the intention of SouthernNet Inc. to
settle this matter without involving law enforcement authorities if you
cooperate with our fraud department 100%.

It will certainly be to your advantage to contact Mr. Tracker as this will
reflect your own decision to assist and avoid prosecution by our company!!!

I'll be expecting your call.

Hacker Tracker

Hold a sec... Engaging Auto Page for Hacker Tracker...

      50 seconds till disconnect
      40 seconds till disconnect
      30 seconds till disconnect
      20 seconds till disconnect
      10 seconds till disconnect
       5 seconds till disconnect


 [Do you think anyone believed this and actually called "Hacker Tracker?" -KL]

What's Happening:  Computer Security Up                            June 4, 1989
Taken from Gannett Westchester Newspapers

                   [Comments in brackets from Delta-Master]

High-tech companies are spending 64% more [than they previously spent] on
computer security, according to a recent survey conducted by the National
Center for Computer Crime Data in Los Angeles.  The group surveyed 3,500 law
enforcement agencies and computer security experts about computer crime.  The
prosecution rate is also up -- 6.4% in 1988 from only 2.4% during 1987.

Contrary to popular image, computer hackers aren't always young boys.  The
study found that 32% of those arrested for computer crimes were female, while
only 14% were under 21.  The study said 45% of hackers were 25 to 30 years old.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Comments from Delta-Master
I do not know about you people, but the public's confusion about hackers starts
to bother me when they make errors.  Seriously, I know of only a few hackers
over the age of 21.  The fact that the newspapers also equate the thug-like
computer criminals with the mastermind-criminal type hacker (you guys) is also
pretty annoying, wouldn't you agree?  One key phrase you must note: "32% OF
THOSE ARRESTED."  Oh well, such are the mistakes of newspapers.

Public Service Commission Bans Operator Companies                April 24, 1989
By Jerri Stroud (St. Louis Post-Dispatch)

The Missouri Public Service Commission voted 4-1 last week to ban providers of
so-called alternative operator services in Missouri because allowing the
companies to operate is "not in the public interest."

Alternative operator services companies contract with hotels, motels colleges,
hospitals, airports, restaurants and other facilities to provide operator
assistance to customers using pay telephones or house phones.  Consumer groups
have complained about price-gouging by the companies nationwide.

Mark Wheatley, a lawyer for the Office of Public Council, praised the
commission's decision.

The Office of Public Council has received numerous complaints about excessive
rates and surcharges by alternative operator services companies, said Wheatley.
Some alternative operator services companies also have accepted other
companies' credit cards without authorization from the companies issuing the
cards, he said.

"We feel that it's an extremely important decision by the commission." said
Wheatley.  But he said he expects the companies affected by the ruling to

Lawyers for the alternative operator services companies could not be reached
for comment.

In it's ruling, the commission said many consumers aren't aware of the rates
charged by the alternative operator services companies until they receive "a
bill for operator services at prices higher than those to which he is
accustomed."  Consumer groups say the rates often are twice or three times the
rates charged by better-known long-distance companies.

Even if an operator service company identifies itself when a consumer makes a
call, the commission said many consumers don't understand the significance of
the identification.

"If the end user is not educated as to the intricacies of using an alternative
operator services provider, he does not truly have a meaningful choice..." the
commission said.

The ruling only affects intrastate calls handled by alternative operator
services companies, but it may effectively prevent the companies from providing
interstate service as well.

The commission specifically denied tariff requests from International
Telecharge Inc. and American Operator Services Inc.  The commission also
directed three other companies -- Teleconnect Inc., Dial US, and Dial USA -- to
file new tariffs consistent with the ruling.

The ruling allows companies to operate who provide operator services in
connection with their business -- long-distance carriers and local telephone
companies, for example.  But the commission also placed limits on these

Under the ruling, operator services companies must:

     * Identify themselves to the caller as well as to the party being billed
       by the call (in the case of a collect or third-party call).

     * Quote rates to the caller or billed party on request, without charge.

     * Use calling card verification procedures acceptable to the companies
       issuing the cards.

     * Post in a prominent position the company's name, detailed complaint
       procedures and instruction on how to reach the local telephone company
       operator and other long-distance carriers.

     * Transfer emergency traffic to the local telephone company or American
       Telephone & Telegraph Co. until the alternative services provider can
       show that it can handle emergency calls adequately.

Fax Attack                                                         May 13, 1989
Taken from The Ann Arbor News

       "Governor's Attempt To Ban Unsolicited Advertisements Backfires!"

HARTFORD, Conn - The great fax attack of 1989 -- an all-out lobbying campaign
against a bill banning unsolicited facsimile advertising -- may have backfired
when the governor's fax machine was jammed for hours with unwanted messages.

Starting Thursday, May 11, and continuing Friday, May 12, Governor William A.
O'Neill's fax machine has been beeping constantly, spitting out unwanted
messages from angry businesses that advertise by fax.

The businesses oppose a bill now awaiting O'Neill's signature that would
prohibit them from marketing their products by fax without first obtaining the
permission of the recipient.  Violators would face a $200 fine.

Starting Thursday morning, dozens of Connecticut businesses faxed to O'Neill's
office a form letter arguing against the fax ban.  The stream of fax messages
was so constant (40 came in before 10 AM) that the governor's office turned off
the fax machine Thursday (May 11).

O'Neill's press secretary, Jon. L. Sandberg, said the governor still hasn't
decided whether he will sign the bill.  But aides to the governor said the
persistent lobbying campaign proved how annoying unwanted messages can be.  The
inconvenience was compounded because the governor's office was unable to use
its fax machine to receive information about spring flooding around the state.

NYNEX Announces Info-Look Gateway                                April 28, 1989
Introducing a new service for accessing information and more... all through
your personal computer!

Starting in May 1989, New York Telephone's INFO-LOOK (tm) Gateway Service can
be your link to accessing a variety of information, products and services.

The INFO-LOOK Gateway simplifies on-line computer access to a variety of
information providers.  When you call the Gateway phone number through your
modem, you'll be able to scan a menu of information services.

The types of information services you may choose from include:  Entertainment,
business, health, food, news, weather, sports, travel, government, educational
and reference information.  The services, some interactive, are provided by
independent companies.

The INFO-LOOK Gateway is easy to use -- even if you're relatively new to using
a PC.

What you'll need to use the INFO-LOOK Gateway

1.  Virtually any type of personal computer.

2.  A modem (300, 1200, or 2400 Baud), and communications software.  This
    enables your computer to communicate with other computers via the telephone

3.  A New York Telephone Calling Card.  If you need a New York Telephone
    Calling Card, (it's FREE), call your service representative whose number
    appears on page one of your New York Telephone bill.

Charges for using the INFO-LOOK Gateway

There are ** no ** Gateway enrollment fees and ** no ** monthly subscription
charges.  In most cases, you will be charged (New York people only):

o  A local call to reach the INFO-LOOK Gateway.

o  While you're browsing the Gateway directory of services, or moving between
   services, you pay $.05 a minute.

o  Once you connect to a service, the charge is determined by the Service
   Provider.  Some services have a per-minute usage charge.  Some services are
   free.  The charges for each service are listed in the Gateway menu.

You'll find most charges itemized on your monthly New York Telephone bill.
Some Service Providers may decide to bill you separately and directly for use
of their services.

Call for more information:

To get your free INFO-LOOK Gateway information booklet call (toll- free)
1-800-338-2720, Ext. 20, any day from 9 a.m. to 11 p.m.

Note:  New York Telephone does not provide or control the services offered
       through the INFO-LOOK Gateway Service.  They are provided by independent
       companies, which are responsible for the content, character, and quality
       of their services.

The predictions run $5 billion now and another $5-10 billion by 1991.

       [INFO-LOOK is already operating in Bell South and Bell Atlantic.]

Pacific Bell Plans Access To Computers                             June 9, 1989
Taken from Santa Cruz Sentinel (Section B)

SAN FRANCISCO (AP) -- Pacific Bell said Thursday it hopes to compete with the
popularity of television by offering people easy access to computerized
libraries, bulletin boards and the use of electronic mail.

PacBell's California On-line -- which will be available to anybody with a
personal computer, telephone and calling card -- will be among the first in the
nation to use a graphic-based system that simplifies procedures so only a
rudimentary familiarity with computers is needed.

"It's going to offer our customers a supplement to their current leisure
activities... and among other things we've seen (in trials) a lot of people
who got away from the TV," said Roger P. Conrad, director of Videotex Gateway

"We feel this is a more productive way for people to spend their lives and we
think a lot of users are going to agree," he added.  Users will pay
"info-entrepreneurs" fees based on the time they use various services and will
be billed on their monthly telephone statements.  Unlike some on-line
information services, users do not have to subscribe ahead of time.

Conrad said the types of services are limited only by vendors' imaginations.
PacBell will make money by selling telecommunication line use to the companies.

Bulletin Boards Of Argentina                                       June 5, 1989
Country Code = 54 (Argentina)
City Code  = 1    (Buenos Aires)

This list might be slightly incorrect due to the passage of time.  The last
update was on December 23, 1986.

Name                    Hours Of Operation       ======= Number=
Beta                    23:00 -  6:30     802-0288
C-Mania                 21:00 -  7:00     362-8843
CBM                     16:00 - 12:00      90-4988
Century 21              24 hours          632-7070
Cerebruss               24 hours           47-2717
Cerebruss Information   ?                  48-8300
Databank                ?                  44-9760
Drean Conection         ?                 953-2523
Los Pinos               13:00 - 19:00      21-0375
Magenta                 ?                 392-0124
Magenta                 ?                 392-0016
Maxes                   23:00 - 7:00      542-2695
Mendieta                22:00 - 8:00      654-6999
Pirates Cove            24:00 - 6:00      783-5023
Sanctuary               24:00 - 3:00      641-4608
Soft-work               22:30 - 9:00       88-2065
TCConection             19:00 - 12:00      22-4197
The Connection          24 Hours           82-5780
The Hacker              23:00 - 7:00      748-2005
Tiger                   ?                 784-2226
XCASA                   ?                 611-8136
BBS-IOM                 24 Hours          804-3602

Note:  The settings for all systems listed above are Even, 7, 1.

                              Contributed by Noli
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.